Technical Support Plan

Environments

We provide multiple deployment options for our products, giving our customers the flexibility to make use of all the product features by choosing the best model that suits your organization's business needs.

Contact Us

Cyware Daily Threat Intelligence February 15, 2018

CoinHoarder campaignA Bitcoin phishing operation, called CoinHoarder, responsible for a theft of $50 million worth of cryptocurrency was discovered by Cisco researchers. Hackers used Google Adwords to manipulate users' search results and steal wallets credentials. Scammers also targeted the popular bitcoin wallet site blockchain[.]info with a client request magnitude of over 200,000 client queries.

Malicious WordPress pluginsTwo rogue WordPress plugins were found that inject obfuscated JavaScript into WordPress websites. The plugins, injectbody and injectscr, generate pop-up ads whenever a visitor clicks on any part of the page. Injectbody and injectscr, share functionalities and file structures, and hide themselves from the list of active plug-ins on the WordPress dashboard.

SatoriThe Satori botnet is targeting routers, cameras, and other types of Internet-connected devices into potent tools to launch cyber attacks. It often exploits unpatched firmware to infect a device.

Top Vulnerabilities Reported in the Last 24 Hours

New ways to exploit chip flawsResearchers are discovering new ways of exploiting the Meltdown and Spectre vulnerabilities. The latest exploit techniques, called MeltdownPrime and SpectrePrime, trick multi-core systems into leaking data stored across more than one processor memory cache. They utilize the timing attack techniques called Prime+Probe and Flush+Reload to exploit the cache invalidations and leak victim memory.

Microsoft Outlook bugsThe February patch released by Microsoft rolled out 50 fixes covering vulnerabilities. Two of these vulnerabilities--CVE-2018-0852 (a remote code execution vulnerability) and CVE-2018-0850 (an elevation of privilege bug)--were also targeting Outlook. Exploiting these vulnerabilities would allow hackers to exploit a flaw in Outlook’s incoming mail processing and load a local or remote message store over SMB.

Web spam notificationsEmails spams are soon going to be a thing of the past with scammers coming up with new techniques to deliver spam notifications to victims' browsers. This new method is called web notification spam and numerous malicious websites are being setup to run this tactic.

To enhance your experience on our website, we use cookies to help us understand how you interact with our website. By continuing navigating through Cyware’s website and its products, you are accepting the placement and use of cookies. You can also choose to disable your web browser’s ability to accept cookies and how they are set. For more information, please see our Privacy Policy.